-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity Blue Team Strategies
By :

The most common way intelligence teams are formed is this: leadership decides their organization needs a blue team. Those in charge have either come to this conclusion because they were influenced by their peers or more often, those above them informed them that it was a need. Although there’s nothing inherently wrong with leadership deciding the organization needs a blue team, this top-down approach is extremely vulnerable to common mistakes that can undermine the credibility and efficacy of a blue team. However, the decision has been made, the die has been cast, and team building begins.
In these cases, the most common action is to promote a high performer from within – who has no background in information security – to lead the new blue team. That person, often carrying a strong incident response or network security background, attempts to fill the role by either falling back on what they know or reading as much...
Change the font size
Change margin width
Change background colour